Analysis
-
max time kernel
63s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2022 01:37
Static task
static1
Behavioral task
behavioral1
Sample
973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe
-
Size
899KB
-
MD5
d3ebbf89c8e3d90ed07c984780885a9c
-
SHA1
1f905610d9f5ae830fa28a96b01533ec948ad690
-
SHA256
973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea
-
SHA512
8ccbfbbf8ff7949b06161a158a2a54320eabc00dc1296db479954270642195609a8ee0db60b3143aa2fd994f39ca0fa1647492fbe090ff5df4e7cfcbf78843c0
-
SSDEEP
768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 868 2472 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3728 schtasks.exe 3340 schtasks.exe 4784 schtasks.exe 3940 schtasks.exe 1708 schtasks.exe 332 schtasks.exe 4628 schtasks.exe 2624 schtasks.exe 3756 schtasks.exe 2044 schtasks.exe 964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 4796 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 80 PID 2472 wrote to memory of 4796 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 80 PID 2472 wrote to memory of 4796 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 80 PID 2472 wrote to memory of 4880 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 81 PID 2472 wrote to memory of 4880 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 81 PID 2472 wrote to memory of 4880 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 81 PID 2472 wrote to memory of 4792 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 83 PID 2472 wrote to memory of 4792 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 83 PID 2472 wrote to memory of 4792 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 83 PID 2472 wrote to memory of 1340 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 84 PID 2472 wrote to memory of 1340 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 84 PID 2472 wrote to memory of 1340 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 84 PID 2472 wrote to memory of 1644 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 85 PID 2472 wrote to memory of 1644 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 85 PID 2472 wrote to memory of 1644 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 85 PID 2472 wrote to memory of 1060 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 86 PID 2472 wrote to memory of 1060 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 86 PID 2472 wrote to memory of 1060 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 86 PID 2472 wrote to memory of 1852 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 89 PID 2472 wrote to memory of 1852 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 89 PID 2472 wrote to memory of 1852 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 89 PID 2472 wrote to memory of 3616 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 90 PID 2472 wrote to memory of 3616 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 90 PID 2472 wrote to memory of 3616 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 90 PID 2472 wrote to memory of 1304 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 101 PID 2472 wrote to memory of 1304 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 101 PID 2472 wrote to memory of 1304 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 101 PID 4796 wrote to memory of 3728 4796 cmd.exe 100 PID 4796 wrote to memory of 3728 4796 cmd.exe 100 PID 4796 wrote to memory of 3728 4796 cmd.exe 100 PID 2472 wrote to memory of 216 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 93 PID 2472 wrote to memory of 216 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 93 PID 2472 wrote to memory of 216 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 93 PID 2472 wrote to memory of 1180 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 94 PID 2472 wrote to memory of 1180 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 94 PID 2472 wrote to memory of 1180 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 94 PID 2472 wrote to memory of 4620 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 95 PID 2472 wrote to memory of 4620 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 95 PID 2472 wrote to memory of 4620 2472 973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe 95 PID 4880 wrote to memory of 3340 4880 cmd.exe 103 PID 4880 wrote to memory of 3340 4880 cmd.exe 103 PID 4880 wrote to memory of 3340 4880 cmd.exe 103 PID 1060 wrote to memory of 1708 1060 cmd.exe 105 PID 1060 wrote to memory of 1708 1060 cmd.exe 105 PID 1060 wrote to memory of 1708 1060 cmd.exe 105 PID 1852 wrote to memory of 3940 1852 cmd.exe 104 PID 1852 wrote to memory of 3940 1852 cmd.exe 104 PID 1852 wrote to memory of 3940 1852 cmd.exe 104 PID 1340 wrote to memory of 4628 1340 cmd.exe 109 PID 1340 wrote to memory of 4628 1340 cmd.exe 109 PID 1340 wrote to memory of 4628 1340 cmd.exe 109 PID 1644 wrote to memory of 332 1644 cmd.exe 108 PID 1644 wrote to memory of 332 1644 cmd.exe 108 PID 1644 wrote to memory of 332 1644 cmd.exe 108 PID 3616 wrote to memory of 2624 3616 cmd.exe 110 PID 3616 wrote to memory of 2624 3616 cmd.exe 110 PID 3616 wrote to memory of 2624 3616 cmd.exe 110 PID 4792 wrote to memory of 4784 4792 cmd.exe 111 PID 4792 wrote to memory of 4784 4792 cmd.exe 111 PID 4792 wrote to memory of 4784 4792 cmd.exe 111 PID 216 wrote to memory of 2044 216 cmd.exe 113 PID 216 wrote to memory of 2044 216 cmd.exe 113 PID 216 wrote to memory of 2044 216 cmd.exe 113 PID 1304 wrote to memory of 3756 1304 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:3340
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:4784
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:4628
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:332
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:3940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5784" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5784" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7458" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵PID:1180
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5478" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵PID:4620
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5478" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8694" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk8694" /TR "C:\Users\Admin\AppData\Local\Temp\973dfc723c9f9647e1555e2ea79ab653093d76055d696956fe895e70dff3fbea.exe"3⤵
- Creates scheduled task(s)
PID:3756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 14282⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2472 -ip 24721⤵PID:2320